{"id":1696,"date":"2022-03-24T17:39:55","date_gmt":"2022-03-24T17:39:55","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=1696"},"modified":"2022-12-17T18:14:17","modified_gmt":"2022-12-17T18:14:17","slug":"fault-injection-analysis","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/","title":{"rendered":"Fault Injection Analysis"},"content":{"rendered":"<div class=\"mai-grid entries entries-grid has-boxed has-image-full\" style=\"--entry-title-font-size:var(--font-size-lg);--align-text:start;--entry-meta-text-align:start;\"><div class=\"entries-wrap has-columns\" style=\"--columns-xs:1\/1;--columns-sm:1\/1;--columns-md:1\/1;--columns-lg:1\/1;--flex-xs:0 0 var(--flex-basis);--flex-sm:0 0 var(--flex-basis);--flex-md:0 0 var(--flex-basis);--flex-lg:0 0 var(--flex-basis);--column-gap:var(--spacing-lg);--row-gap:var(--spacing-lg);--align-columns:start;\"><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:1;\" aria-label=\"TensorFI 2: A fault injector for TensorFlow 2 applications\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/tensorfi-2-a-fault-injector-for-tensorflow-2-applications\/\" rel=\"bookmark\">TensorFI 2: A fault injector for TensorFlow 2 applications<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:2;\" aria-label=\"XFC: A framework for eXploitable Fault Characterization in block ciphers\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/xfc-a-framework-for-exploitable-fault-characterization-in-block-ciphers\/\" rel=\"bookmark\">XFC: A framework for eXploitable Fault Characterization in block ciphers<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:3;\" aria-label=\"ObfusGEM\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/obfusgem\/\" rel=\"bookmark\">ObfusGEM<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:4;\" aria-label=\"AVFSM: Quantitative Measerment of the Vulnerability in FSMs to Fault Injection Attacks\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/avfsm-quantitative-measerment-of-the-vulnerability-in-fsms-to-fault-injection-attacks\/\" rel=\"bookmark\">AVFSM: Quantitative Measerment of the Vulnerability in FSMs to Fault Injection Attacks<\/a><\/h3>\n<\/div><\/article><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":3529,"parent":570,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1696"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=1696"}],"version-history":[{"count":16,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1696\/revisions"}],"predecessor-version":[{"id":3585,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1696\/revisions\/3585"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/570"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/3529"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=1696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}